CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon
Ethical Hacker v11 | Intermediate
- 4 videos | 54m 26s
- Includes Assessment
- Earns a Badge
When you're looking for useful target information, you want to pull from every available source. In this course, you'll investigate how to gather and inspect metadata for possible sensitive info about a target. You'll learn how to use wordlists for fuzzing and password attacks, about the usefulness of custom wordlists, and how to generate a wordlist based off the target's web presence. Next, you'll examine how e-mail tracking systems can glean info like IP addresses, geolocation, and host operating systems. Finally, you'll learn about useful information that can be found using WHOIS and DNS service. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
recognize tools used to extract metadatarecognize tools used to locate files on a websiteidentify the location of sample word list files in Kali Linuxrecognize tools that can be used to create custom word list filesidentify the term used for files that contain common words and passwords
recognize tools used for email trackingrecognize commands used to enumerate DNSidentify the different types of whois modelsidentify tools used to perform whois searches
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE